Re: EAP TLS - Hostapd

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Satya Prakash Prasad <satyaprakash.developer.unix@xxxxxxxxx> wrote:
    > After the EAP success case, how peer / server side will read / write
    > data - which APIs code implements the same - also how do we verify that
    > EAP authentication was successful before each write / data?

After the handshake, session keys are derived from the EAP session using the
MSK, and installed into the supplicant (and authenticator) kernel.

But, perhaps I mis-undertand your question, are you trying to send more
traffic within the EAP-TLS connection?


Attachment: signature.asc
Description: PGP signature

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap

[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux